Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined. Phase 3 is what the whole BCP is made of, essentially. In this phase, all of the planning, relationship information and real analysis take place. For each disaster scenario defined in...

It nearly sounds as if it’s out of a movie. Picture it: You boot up your computer, only to discover that all your files have disappeared — and a stranger is holding them hostage until you fork over some dough. It’s one of the latest threats to your network and unlike many cyber threats, the culprits are literally taunting you over what’s been done....

We all run into standard printer frustrations. The inevitable ‘paper jam’ or ‘ink too low,’ when it’s clear there is plenty enough ink left to print your one page document. Let’s be honest, it wouldn’t be a Monday without it. But lately, it’s been security analysts who have been called to the printer rescue instead of the intern. Security analysts everywhere...

We’ve all been there…a quick glance at the monthly phone bill, followed by a second and then the long stare and a raising of the eye brows. ‘Did I really talk for that long?’ ‘He was in Singapore on that call!?! A majority of the time, it’s a slight increase in the monthly bill that draws initial skepticism. But, when the monthly phone bill jumps up to the same...

There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account… Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. The problem? The bad guys get as many attempts as they want and the bank only has to fail once before millions can be lost...

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined. Phase 3 is what the whole BCP is made of, essentially. In this phase, all of the planning, relationship information and real analysis take place. For each disaster scenario defined in...

Spotlight on your bank account…yes, YOUR bank account There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account. Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. Its all in the numbers..The bad guys get as many attempts as they want...

Email security is one of those things that most IT departments are not sure about how to do right. Right, is up to interpretation, though thorough is something that can be more easily attained. I will go over my Home Run approach to securing email in this post. As you may have guessed, the Home Run approach consists of 4 bases of security to cover, to further...

I don’t know about you, but I will only assume a few things, and one of them is that you must hate junk email, viruses, SPAM and anything that can endanger the availability and integrity of company information. Let’s face it, in today’s technology world email and digital communications are the prime ways you reach your customers, and...

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined. Phase 3 is what the whole BCP is made of, essentially. In this phase, all of the planning, relationship information and real analysis take place. For each disaster scenario defined in...

Why Join?

Get on board, FREE!

Where can you get strategic technology advice, I mean TRUSTED IT ADVISORY SERVICES, from a seasoned CIO/CTO and technology manager? FOR FREE?

HERE! So why not register? If you are still on the fence, read more below. I thank you in advance for registering to get the full advantage of this FREE site!

So what's the goal here?

My mission is to help business owners, IT Executives and Executive Management make informed technology decisions. That's it - simple!

If you've ever needed more information, clarification of a specific solution or technology, or maybe just an independent 3rd party take on a solution that you IT team is proposing for your business, then this is the place for you! I can give you very technical information, or very non-technical versions of the same information, in many ways. Remember, the goal is for YOU to be able to make informed technology decisions!

If you don't understand a proposal or the technology behind it, then how can you make a decision that you are comfortable with, without a doubt? Information is power, and the power to run and manage your company hinges on the knowledge you have to make strategic business operations decisions. Without all of the information, each decision, whether technical or not, can and will have dramatic effects on the future of your business.

If there is a technology or topic you want discussed, please register and send me a message from the 'Contact' area so I can address them here for all to benefit from, or if you wish, we can keep the discussion 1-on-1.